{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,3,29]],"date-time":"2025-03-29T04:03:44Z","timestamp":1743221024602,"version":"3.40.3"},"reference-count":25,"publisher":"Springer Science and Business Media LLC","issue":"4","license":[{"start":{"date-parts":[[2025,3,25]],"date-time":"2025-03-25T00:00:00Z","timestamp":1742860800000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"},{"start":{"date-parts":[[2025,3,25]],"date-time":"2025-03-25T00:00:00Z","timestamp":1742860800000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":["SN COMPUT. SCI."],"DOI":"10.1007\/s42979-025-03831-7","type":"journal-article","created":{"date-parts":[[2025,3,28]],"date-time":"2025-03-28T03:45:28Z","timestamp":1743133528000},"update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":0,"title":["A Crossbreed and Powerful Machine Learning Archetype for Unparalleled Safety and Effectiveness in Wireless Sensor Networks"],"prefix":"10.1007","volume":"6","author":[{"given":"Deepak","family":"Sharma","sequence":"first","affiliation":[]},{"given":"K. V.","family":"Shahnaz","sequence":"additional","affiliation":[]},{"given":"T. Helan","family":"Vidhya","sequence":"additional","affiliation":[]},{"given":"Korra","family":"Srinivas","sequence":"additional","affiliation":[]},{"given":"Lakshmi Ramani","family":"Burra","sequence":"additional","affiliation":[]},{"given":"Yeruva Jaipal","family":"Reddy","sequence":"additional","affiliation":[]},{"given":"Shubham","family":"Joshi","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2025,3,25]]},"reference":[{"key":"3831_CR1","doi-asserted-by":"publisher","first-page":"3636","DOI":"10.1109\/JIOT.2020.3023168","volume":"8","author":"D Mart\u00edn-Lammerding","year":"2021","unstructured":"Mart\u00edn-Lammerding D, C\u00f3rdoba A, Astrain JJ, Medrano P, Villadangos J. An ontology-based system to collect WSN-UAS data effectively. IEEE Internet Things J. 2021;8:3636\u201352.","journal-title":"IEEE Internet Things J"},{"key":"3831_CR2","doi-asserted-by":"publisher","first-page":"616","DOI":"10.1109\/COMST.2019.2953364","volume":"22","author":"I Butun","year":"2020","unstructured":"Butun I, \u00d6sterberg P, Song H. Security of the internet of things: vulnerabilities, attacks, and countermeasures. IEEE Commun Surv Tutor. 2020;22:616\u201344.","journal-title":"IEEE Commun Surv Tutor"},{"key":"3831_CR3","doi-asserted-by":"publisher","first-page":"3948","DOI":"10.1109\/JIOT.2019.2959094","volume":"7","author":"L Zhou","year":"2020","unstructured":"Zhou L, Ge C, Hu S, Su C. Energy-efficient and privacy-preserving data aggregation algorithm for wireless sensor networks. IEEE Internet Things J. 2020;7:3948\u201357.","journal-title":"IEEE Internet Things J"},{"key":"3831_CR4","doi-asserted-by":"publisher","first-page":"350","DOI":"10.1109\/TII.2019.2916300","volume":"16","author":"X Liu","year":"2020","unstructured":"Liu X, Qiu T, Zhou X, Wang T, Yang L, Chang V. Latency-aware path planning for disconnected sensor networks with mobile sinks. IEEE Trans Ind Inform. 2020;16:350\u201361.","journal-title":"IEEE Trans Ind Inform"},{"key":"3831_CR5","doi-asserted-by":"publisher","first-page":"5527","DOI":"10.1109\/TII.2019.2953937","volume":"16","author":"G Han","year":"2020","unstructured":"Han G, Wang H, Miao X, Liu L, Jiang J, Peng Y. A dynamic multipath scheme for protecting source-location privacy using multiple sinks in WSNs intended for IIoT. IEEE Trans Ind Inform. 2020;16:5527\u201338.","journal-title":"IEEE Trans Ind Inform"},{"key":"3831_CR6","doi-asserted-by":"publisher","first-page":"407","DOI":"10.1109\/JSAC.2018.2872380","volume":"37","author":"R Du","year":"2019","unstructured":"Du R, Xiao M, Fischione C. Optimal node deployment and energy provision for wirelessly powered sensor networks. IEEE J Sel Areas Commun. 2019;37:407\u201323.","journal-title":"IEEE J Sel Areas Commun"},{"key":"3831_CR7","doi-asserted-by":"publisher","first-page":"1313","DOI":"10.1109\/JIOT.2019.2954720","volume":"7","author":"MA Al-Jarrah","year":"2020","unstructured":"Al-Jarrah MA, Yaseen MA, Al-Dweik A, Dobre OA, Alsusa E. Decision fusion for IoT-based wireless sensor networks. IEEE Internet Things J. 2020;7:1313\u201326.","journal-title":"IEEE Internet Things J"},{"key":"3831_CR8","doi-asserted-by":"publisher","first-page":"68","DOI":"10.1109\/COMST.2019.2935795","volume":"22","author":"A Tariq","year":"2020","unstructured":"Tariq A, Rehman RA, Kim B. Forwarding strategies in NDN-based wireless networks: a survey. IEEE Commun Surv Tutor. 2020;22:68\u201395.","journal-title":"IEEE Commun Surv Tutor"},{"key":"3831_CR9","doi-asserted-by":"publisher","first-page":"1741","DOI":"10.1109\/TVT.2019.2959808","volume":"69","author":"J Baek","year":"2020","unstructured":"Baek J, Han SI, Han Y. Energy-efficient UAV routing for wireless sensor networks. IEEE Trans Veh Technol. 2020;69:1741\u201350.","journal-title":"IEEE Trans Veh Technol"},{"key":"3831_CR10","doi-asserted-by":"publisher","first-page":"106","DOI":"10.1109\/TETC.2017.2671847","volume":"8","author":"A Mehmood","year":"2020","unstructured":"Mehmood A, Lv Z, Lloret J, Umar MM. ELDC: an artificial neural network based energy-efficient and robust routing scheme for pollution monitoring in WSNs. IEEE Trans Emerg Top Comput. 2020;8:106\u201314.","journal-title":"IEEE Trans Emerg Top Comput"},{"key":"3831_CR11","doi-asserted-by":"publisher","first-page":"61","DOI":"10.1109\/TSUSC.2019.2913374","volume":"5","author":"A Boukerche","year":"2020","unstructured":"Boukerche A, Wu Q, Sun P. Efficient green protocols for sustainable wireless sensor networks. IEEE Trans Sustain Comput. 2020;5:61\u201380.","journal-title":"IEEE Trans Sustain Comput"},{"key":"3831_CR12","doi-asserted-by":"publisher","first-page":"1120","DOI":"10.1109\/TII.2019.2936518","volume":"16","author":"F Shi","year":"2020","unstructured":"Shi F, Tuo X, Ran L, Ren Z, Yang SX. Fast convergence time synchronization in wireless sensor networks based on average consensus. IEEE Trans Ind Inform. 2020;16:1120\u20139.","journal-title":"IEEE Trans Ind Inform"},{"key":"3831_CR13","doi-asserted-by":"crossref","unstructured":"Santos JD, Terrasson G, Llaria A. Improving Low Power Listening (LPL) Mechanism to Save Energy Consumption in WSN. In: Proceedings of the 2020 IEEE SENSORS, Rotterdam, The Netherlands, 25\u201328 October 2020; pp. 1\u20134.","DOI":"10.1109\/SENSORS47125.2020.9278843"},{"key":"3831_CR14","doi-asserted-by":"publisher","first-page":"2684","DOI":"10.1109\/TVT.2020.2963841","volume":"69","author":"T Van Nguyen","year":"2020","unstructured":"Van Nguyen T, Do TN, Bao VNQ, da Costa DB, An B. On the performance of multihop cognitive wireless powered D2D communications in WSNs. IEEE Trans Veh Technol. 2020;69:2684\u201399.","journal-title":"IEEE Trans Veh Technol"},{"key":"3831_CR15","doi-asserted-by":"publisher","unstructured":"Rizvi SQAf et al. Classifying Parkinson\u2019s disease using resting state electroencephalogram signals and U EN-PDNet. IEEE Access. January 2023, pp. 1\u20131. https:\/\/doi.org\/10.1109\/ACCESS.2023.3319248.","DOI":"10.1109\/ACCESS.2023.3319248"},{"key":"3831_CR16","doi-asserted-by":"publisher","first-page":"83052","DOI":"10.1109\/ACCESS.2023.3290906","volume":"11","author":"K Abbas","year":"2023","unstructured":"K. Abbas et al. Predicting the future popularity of academic publications using deep learning by considering it as temporal citation networks. In IEEE Access, 2023; 11:83052\u201383068. https:\/\/doi.org\/10.1109\/ACCESS.2023.3290906.","journal-title":"IEEE Access"},{"key":"3831_CR17","doi-asserted-by":"publisher","first-page":"39635","DOI":"10.1109\/ACCESS.2020.2976134","volume":"8","author":"A Khan","year":"2020","unstructured":"Khan A, et al. Predicting emerging trends on social media by modeling it as temporal bipartite networks. IEEE Access. 2020;8:39635\u201346.","journal-title":"IEEE Access"},{"key":"3831_CR18","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1007\/s11042-023-14384-3","volume":"82","author":"A Khan","year":"2023","unstructured":"Khan A., Li JP, Husain MA. Power grid stability analysis using pipeline machine. Multimed Tools Appl 2023;82:25651\u201325675. https:\/\/doi.org\/10.1007\/s11042-023-14384-3.","journal-title":"Multimed Tools Appl"},{"key":"3831_CR19","doi-asserted-by":"publisher","first-page":"107","DOI":"10.1016\/j.compag.2016.03.023","volume":"124","author":"Y Rao","year":"2016","unstructured":"Rao Y, Jiang Z-H, Lazarovitch N. Investigating signal propagation and strength distribution characteristics of wireless sensor networks in date palm orchards. Comput Electron Agric. 2016;124:107\u201320.","journal-title":"Comput Electron Agric"},{"key":"3831_CR20","doi-asserted-by":"publisher","first-page":"553","DOI":"10.1016\/j.compag.2016.07.011","volume":"127","author":"A Raheemah","year":"2016","unstructured":"Raheemah A, Sabri N, Salim M, Ehkan P, Ahmad RB. New empirical path loss model for wireless sensor networks in mango greenhouses. Comput Electron Agric. 2016;127:553\u201360.","journal-title":"Comput Electron Agric"},{"issue":"4","key":"3831_CR21","first-page":"3119","volume":"9","author":"V Roy","year":"2020","unstructured":"Roy V, et al. Network physical address based encryption technique using digital logic. Int J Sci Technol Res. 2020;9(4):3119\u201322.","journal-title":"Int J Sci Technol Res"},{"key":"3831_CR22","doi-asserted-by":"crossref","unstructured":"Zivkovic M, Bacanin N, Zivkovic T, Strumberger I, Tuba E, Tuba M. Enhanced Grey wolf algorithm for energy efficient wireless sensor networks. In: 2020 Zooming Innovation in Consumer Technologies Conference (ZINC), 2020; pp. 87\u201392, Novi Sad, Serbia.","DOI":"10.1109\/ZINC50678.2020.9161788"},{"key":"3831_CR23","doi-asserted-by":"crossref","unstructured":"Zivkovic M, Bacanin N, Tuba E, Strumberger I, Bezdan T, Tuba M. Wireless sensor networks lifetime optimization based on the improved firefly algorithm. In: 2020 International Wireless Communications and Mobile Computing (IWCMC), 2020; pp. 1176\u20131181, Limassol, Cyprus.","DOI":"10.1109\/IWCMC48107.2020.9148087"},{"key":"3831_CR24","doi-asserted-by":"publisher","first-page":"102057","DOI":"10.1016\/j.phycom.2023.102057","volume":"58","author":"AA Khan","year":"2023","unstructured":"Khan AA, Almuzaini KK, Macedo VDJ, Ojo S, Minchula VK, Roy V. MaReSPS for energy efficient spectral precoding technique in large scale MIMO-OFDM. Phys Commun. 2023;58:102057. https:\/\/doi.org\/10.1016\/j.phycom.2023.102057. (ISSN 1874-4907).","journal-title":"Phys Commun"},{"key":"3831_CR25","doi-asserted-by":"publisher","first-page":"15","DOI":"10.1155\/2022\/5713092","volume":"2022","author":"P Kumar","year":"2022","unstructured":"Kumar P, Baliyan A, Ramalingeswara Prasad K, Sreekanth N, Jawarkar P, Roy V, Amoatey ET. Machine learning enabled techniques for protecting wireless sensor networks by estimating attack prevalence and device deployment strategy for 5G networks. Wirel Commun Mob Comput. 2022;2022:15. https:\/\/doi.org\/10.1155\/2022\/5713092. (Article ID 5713092).","journal-title":"Wirel Commun Mob Comput"}],"container-title":["SN Computer Science"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s42979-025-03831-7.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/article\/10.1007\/s42979-025-03831-7\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s42979-025-03831-7.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,3,28]],"date-time":"2025-03-28T03:45:33Z","timestamp":1743133533000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/s42979-025-03831-7"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2025,3,25]]},"references-count":25,"journal-issue":{"issue":"4","published-online":{"date-parts":[[2025,4]]}},"alternative-id":["3831"],"URL":"https:\/\/doi.org\/10.1007\/s42979-025-03831-7","relation":{},"ISSN":["2661-8907"],"issn-type":[{"value":"2661-8907","type":"electronic"}],"subject":[],"published":{"date-parts":[[2025,3,25]]},"assertion":[{"value":"8 May 2024","order":1,"name":"received","label":"Received","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"23 February 2025","order":2,"name":"accepted","label":"Accepted","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"25 March 2025","order":3,"name":"first_online","label":"First Online","group":{"name":"ArticleHistory","label":"Article History"}},{"order":1,"name":"Ethics","group":{"name":"EthicsHeading","label":"Declarations"}},{"value":"The authors declare no conflict of interest.","order":2,"name":"Ethics","group":{"name":"EthicsHeading","label":"Conflict of Interest"}},{"value":"This article does not contain any studies with animals performed by any of the authors.","order":3,"name":"Ethics","group":{"name":"EthicsHeading","label":"Ethical Approval"}}],"article-number":"317"}}